Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies

Answers

Answer 1
Natural materials
Hope this helps

Related Questions

can someone's answer this​

Answers

Answer:

See explanation

Explanation:

Required

The surface area of each shape

Triangle

[tex]Area = \frac{1}{2}bh[/tex]

[tex]b\to base; h \to height[/tex]

So:

[tex]Area = \frac{1}{2} * 23 * 21[/tex]

[tex]Area = 241.5m^2[/tex]

Square

[tex]Area = l^2[/tex]

[tex]l \to length[/tex]

So:

[tex]Area = 10^2[/tex]

[tex]Area = 100m^2[/tex]

Rhombus

[tex]Area =a^2\sin(\theta)[/tex]

[tex]a \to side\ length[/tex]

[tex]\theta \to any\ interior\ angle[/tex] (not given)

So:

[tex]Area =18^2\sin(\theta)[/tex]

[tex]Area =324\sin(\theta)[/tex]

Trapezium

[tex]Area = \frac{1}{2}(a + b)*h[/tex]

[tex]a,b \to parallel\ sides; h \to height[/tex]

So:

[tex]Area = \frac{1}{2}(18 + 23)*21[/tex]

[tex]Area = \frac{1}{2}*41*21[/tex]

[tex]Area = 430.5m^2[/tex]

Circle

[tex]Area = \frac{\pi d^2}{4}[/tex]

[tex]d \to diameter[/tex]

So:

[tex]Area = \frac{3.14 * 5^2}{4}[/tex]

[tex]Area = \frac{3.14 * 25}{4}[/tex]

[tex]Area = \frac{78.5}{4}[/tex]

[tex]Area = 19.625m^2[/tex]

Arrange the code so that the numbers are swapped.

Second part

savec

First part

C=D

Third part

D= save

Answers

Answer:

Following are the correct code for swapping:

save=C

C=D

D=save

Explanation:

Please find the attached file of the program with output.

In the above, we let that the three integer variable "save, C, and D" is declared that in which the variable "C and D" holds a value and "save" variable is used to hold "C" variable value.

At this the "C" variable is empty. so, it holds a "D" variable value and when it is empty it holds a save value. At this, we perform the swapping.

defination of Wi-Fi plz​

Answers

Answer:

A facility allowing computers,smartphones and other devices to connect to the internet or communicate with one another wirelessly.

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may display a _________ before allowing you to move forward. Select one: Red Flashing Lights Red X Warning Bell Warning Page

Answers

Answer:

the last option

warning page

pls help it’s on a test!! no links :) you can zoom in if hard to read

Answers

Answer:

the last one

Explanation:

the domain specifies exactly what file is requested the path specifies where the browsers request should be sent

You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location

Answers

Answer: Windows Configuration Designer (WCD)

Explanation:

The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).

Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.

The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register

Answers

Answer:

b. Memory-Management Unit

Explanation:

The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.

pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE

Answers

Answer:

?

Explanation:

I will give free brainiest if you guess my favorite car among these 3

Corvette
LaFerrari
Porsche

Answers

Answer:

LaFerrari

Explanation:

Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression

Answers

feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends


What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit

Answers

Answer:

it's D

Explanation: i had this question before and i got it right :)

Answer:

D. An initial deposit

Explanation: Hope this helps :)

this is used to copy information from cell to cell in the spread sheet

A. active cell
B. Auto fit
C. Grid lines
D. Fill handle

please help me with this

Answers

Answer:

D. Fill handle

Explanation:

Required

Which can be used to copy from cell to cell

(a); Means the current cell being selected in the spreadsheet program

(b): Used to fit all columns in the spreadsheet program. Usually, the columns are fitted based on their width.

(c): The vertical and horizontal lines that separate cells.

(d): This is used to copy from one cell to another, especially adjacent cells.

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Answers

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

compare shopping centre and open -air market​

Answers

Answer:

The similarities between a shopping center and an open-air market are;

1. Goods are bought and sold in both a shopping center and an open-air market

2. The stores within the location have different owners

3. Buyers can move between stores for transactions

The differences between a shopping center and an open-air market are;

1) The shopping center is usually roofed, while an open-air market is usually located outdoors

2) The stores in a shopping center more often have a checkout point, while stores in an open-air market rarely make use of a checkout

3) Items found with a defect after purchase can usually be returned for a replacement in a shopping center, while it is necessary to check an item well when buying from an open-air market as returning such items is usually difficult

Explanation:

A shopping center is a complex or area that have several shop groups built together which can all be located under a roof

Professional offices, restaurants, banks, theaters, and pharmacy's  can also be located in a shopping center

Open-air market is a place in the public used for the sale of food and merchandise

Select the correct answer.
Which formula below will return the same result as the formula =SUM(B1:B5)?

A.
=B1+B5
B.
=B1+B2+B3+B4+B5
C.
=B1,B2,B3,B4,B5
D.
=B1,B5
E.
=#B1:#B5

Answers

D because of the sun

I got a question in computer science I don't understand, can someone please help.​

Answers

Answer:

Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.

Please give brainliest, means alot!

what is peopleware?
need help​

Answers

Answer:

Peopleware is a term used to refer to one of the three core aspects of computer technology, the other two being hardware and software.

Is 10 teraflops good? How much does the best PC in the world have?​

Answers

Yeah it’s pretty good. The system, built by Fujitsu for Japan's RIKEN Center for Computational Science, posted a maximum sustained performance level of 442,010 teraflops per second on the Linpack benchmark.

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

Match the elements used in web searches to their functions.

1. row
2. column
3. cell
4. worksheet

where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells

Answers

Row - horizontal
Column - vertical
Cell - where data and formulas can be entered
Worksheet - a grid of rows and columns

Answer:

where data and formulas can be entered - Cells

A grid of rows and columns - Worksheet

A horizontal set of cells - Row

A vertical set of cells - Column

Explanation:

I got it right on the Edmentum test.

Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.

Answers

Answer:

Parent

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.

In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

What is one similarity between compiled and interpreted programming languages? (5 points)

Both compiled and interpreted languages are translated one line of code at a time before moving to the next line.

Both compiled and interpreted languages can be shared with others while keeping the source code private.

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

There are no similarities between compiled and interpreted programming languages.

Answers

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, the similarity between both languages is that they are high level languages and translate code for a computer to understand.

A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices

Answers

Answer:

Private.

Explanation:

The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.

Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.

Thus, a private cloud is a correct answer.

Write an expression that evaluates to true if the value of the int variable widthOfBox is not divisible by the value of the int variable widthOfBook. Assume that widthOfBook is not zero. ("Not divisible" means has a remainder.)

Answers

Answer:

The expression is:

if widthOfBox % widthOfBook != 0

Explanation:

Given

Variables:

(1) widthOfBox and

(2) widthOfBook

Required

Statement that checks if (1) is divisible by (2)

To do this, we make use of the modulo operator. This checks if (1) is divisible by 2

If the result of the operation is 0, then (1) can be divided by (2)

Else, (1) can not be divided by (2)

From the question, we need the statement to be true if the numbers are not divisible.

So, we make use of the not equal to operator alongside the modulo operator

Select the correct answer from each drop-down menu.
Complete the sentence about uses of spreadsheets.

Two of the most common uses of spreadsheets are to _____ data and _____ data.

First blank
1. Create new
2. Search for
3. Store available

Second blank
1.Sort
2. Classify
3. Download

Answers

I think it’s 1, 2 and if im wrong im sorry

Two of the most common uses of spreadsheets are to create new data and classify data. Thus, the correct options for this question are A and B respectively.

What are the uses of Spreadsheet?

The uses of spreadsheets are as follows:

It is used to collect and store data that is systematically organized.It authorizes users in order to make calculations with the stored data.Spreadsheets are also used to make charts and graphs.It actively supports users in data sifting and cleanup.

According to the context of this question, apart from the above top uses of spreadsheets, there are other various uses that can be delivered by this platform to the user that make their professional work more efficient, organized, and attractive.

Therefore, the most common uses of spreadsheets are to create new data and classify data. Thus, the correct options for this question are A and B respectively.

To learn more about Spreadsheets, refer to the link:

https://brainly.com/question/26919847

#SPJ2

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

Other Questions
The French and Indian War was probably the 1st event that eventuallylead to the colonists wanting their independence from Great Britainbecause .....O The British spent a lot of money on the war so to get some of that moneyback they started to tax the colonistsThe British Army raided the White House and burned it downO The British turned the native americans against the colonistsO The British wanted 50% of the colonists to return to Britain to make up forthe workers that were killed in the French and Indian warHELP PLEASE The triangles have a scale of 3: 5. What is the value of a? * Work is done when you lift an object to a certain height. If the force exerted is greater than the weight of the object, input work is greater than the output work. Where does the extra energy go? Essay starters for art or choirs ? Can someone help me with a bio organic questions?? i need help!! im struggling with this question As the outgoing sports prefect, write a report for publication in your school magazing on sporting activities during your term of office This question is worth 20 points and I will mark brainliestwhich expressions are equivalent to 2 (3h + 7) choose "equivalent" or "Not equivalent" for each expression.6h+72+3h+76h+7+73h+3h+14(3h+7) + (3h+7) Can you help me with these questions help please help me please The area of a triangle is 14 square inches, and the triangle's height is 7 inches. Use the formula A = bh, where A is area, b isbase, and h is height, to find the length of the base of the triangle.49 inches1 inch2 inches4 inches Why might an author include dialect in a story? Check all that apply.to allude to a character's regional backgroundto describe what a particular setting looks liketo add to the cultural context of a story's settingto allude to a character's social backgroundto create a more genuine dialogue between characters Determine the value of x in the diagram. Find the measure of angle C Phenolphthalein meaning Jon Deposits $14,500 into an account paying 5% annual interest compounded quarterly and Sara deposits $16,250 into an account paying 4% annual interest compounded daily who will have more money after 1 year? How much more will that person have? Show and explain all work. nsahbqbecj;b ; dbhbqbq In how many ways 2450 can be written as a product of 2 factors?Select one:O a. 9O b. 6C. 18O d. 10 Bring thyself to account each day ere thou art summoned to a reckoning; for death, unheralded, shall come upon thee and thou shalt be called to give account for thy deeds. - Bahaullah, The Hidden Words, p. 11.What does this quote mean to you?plz help asap please some one help Y/3+y/4=5/6 Find the LCD that would eliminate the fractions